Analysis
-
max time kernel
121s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
11/05/2023, 03:48
Static task
static1
Behavioral task
behavioral1
Sample
d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe
Resource
win10-20230220-en
General
-
Target
d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe
-
Size
780KB
-
MD5
36604f2f7eaa4d277081f858425b2955
-
SHA1
350cb3ecdc84f2aa643cae2fdf5eae4465f88171
-
SHA256
d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315
-
SHA512
b0a9045bf2c202b527c9fa14ce14115256347396f1061fdb07a0a97ccfed43578e235ffdb6393aa867479ea40758e2375f43690d3c2812e938372c7872ead716
-
SSDEEP
24576:0yUMQjm+laxefPUq0ZQsICHJSM35laUJ:DUVjm+lakX0oGJSW5la
Malware Config
Extracted
redline
lessa
185.161.248.75:4132
-
auth_value
29d77029685f0783eb0ec17c1b173cb2
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o0400979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o0400979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o0400979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o0400979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o0400979.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
resource yara_rule behavioral1/memory/4936-199-0x0000000002380000-0x00000000023CA000-memory.dmp family_redline behavioral1/memory/4936-200-0x00000000049B0000-0x00000000049F6000-memory.dmp family_redline behavioral1/memory/4936-201-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-202-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-204-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-206-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-208-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-210-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-212-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-214-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-216-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-218-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-220-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-222-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-224-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-226-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-228-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-231-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-235-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-230-0x0000000004A70000-0x0000000004A80000-memory.dmp family_redline behavioral1/memory/4936-237-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline behavioral1/memory/4936-239-0x00000000049B0000-0x00000000049F2000-memory.dmp family_redline -
Executes dropped EXE 9 IoCs
pid Process 1672 z2495403.exe 4248 z1961723.exe 4080 o0400979.exe 952 p1126465.exe 4936 r1438619.exe 3328 s8494428.exe 2492 oneetx.exe 4436 oneetx.exe 3228 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2280 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o0400979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o0400979.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1961723.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z2495403.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2495403.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1961723.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4108 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4080 o0400979.exe 4080 o0400979.exe 952 p1126465.exe 952 p1126465.exe 4936 r1438619.exe 4936 r1438619.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4080 o0400979.exe Token: SeDebugPrivilege 952 p1126465.exe Token: SeDebugPrivilege 4936 r1438619.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3328 s8494428.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1484 wrote to memory of 1672 1484 d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe 66 PID 1484 wrote to memory of 1672 1484 d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe 66 PID 1484 wrote to memory of 1672 1484 d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe 66 PID 1672 wrote to memory of 4248 1672 z2495403.exe 67 PID 1672 wrote to memory of 4248 1672 z2495403.exe 67 PID 1672 wrote to memory of 4248 1672 z2495403.exe 67 PID 4248 wrote to memory of 4080 4248 z1961723.exe 68 PID 4248 wrote to memory of 4080 4248 z1961723.exe 68 PID 4248 wrote to memory of 4080 4248 z1961723.exe 68 PID 4248 wrote to memory of 952 4248 z1961723.exe 69 PID 4248 wrote to memory of 952 4248 z1961723.exe 69 PID 4248 wrote to memory of 952 4248 z1961723.exe 69 PID 1672 wrote to memory of 4936 1672 z2495403.exe 71 PID 1672 wrote to memory of 4936 1672 z2495403.exe 71 PID 1672 wrote to memory of 4936 1672 z2495403.exe 71 PID 1484 wrote to memory of 3328 1484 d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe 72 PID 1484 wrote to memory of 3328 1484 d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe 72 PID 1484 wrote to memory of 3328 1484 d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe 72 PID 3328 wrote to memory of 2492 3328 s8494428.exe 73 PID 3328 wrote to memory of 2492 3328 s8494428.exe 73 PID 3328 wrote to memory of 2492 3328 s8494428.exe 73 PID 2492 wrote to memory of 4108 2492 oneetx.exe 74 PID 2492 wrote to memory of 4108 2492 oneetx.exe 74 PID 2492 wrote to memory of 4108 2492 oneetx.exe 74 PID 2492 wrote to memory of 2280 2492 oneetx.exe 77 PID 2492 wrote to memory of 2280 2492 oneetx.exe 77 PID 2492 wrote to memory of 2280 2492 oneetx.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe"C:\Users\Admin\AppData\Local\Temp\d5017341d9ec265ae3d3ac0c23e522191b5026260f653628d2e6b280d85cd315.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2495403.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2495403.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1961723.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1961723.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0400979.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0400979.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1126465.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1126465.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1438619.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1438619.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8494428.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8494428.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4108
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:4436
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:3228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5918029afa2b528e8dae80f9254a148ce
SHA151b4a69e1627d433c441f6616071d6ea84721bd7
SHA256fdfce71584bdaa6b6ddece13970373194175aeda6649d0b5d60df49786db9b7d
SHA5125bd74e22165009b6127e0e9c432b993e201dc0d635fc708a5cbd95e292a6116cc5c21b31c72cdf253ba27288667b3186c2b60532409c310e79cb47a8358e27bb
-
Filesize
232KB
MD5918029afa2b528e8dae80f9254a148ce
SHA151b4a69e1627d433c441f6616071d6ea84721bd7
SHA256fdfce71584bdaa6b6ddece13970373194175aeda6649d0b5d60df49786db9b7d
SHA5125bd74e22165009b6127e0e9c432b993e201dc0d635fc708a5cbd95e292a6116cc5c21b31c72cdf253ba27288667b3186c2b60532409c310e79cb47a8358e27bb
-
Filesize
232KB
MD5918029afa2b528e8dae80f9254a148ce
SHA151b4a69e1627d433c441f6616071d6ea84721bd7
SHA256fdfce71584bdaa6b6ddece13970373194175aeda6649d0b5d60df49786db9b7d
SHA5125bd74e22165009b6127e0e9c432b993e201dc0d635fc708a5cbd95e292a6116cc5c21b31c72cdf253ba27288667b3186c2b60532409c310e79cb47a8358e27bb
-
Filesize
232KB
MD5918029afa2b528e8dae80f9254a148ce
SHA151b4a69e1627d433c441f6616071d6ea84721bd7
SHA256fdfce71584bdaa6b6ddece13970373194175aeda6649d0b5d60df49786db9b7d
SHA5125bd74e22165009b6127e0e9c432b993e201dc0d635fc708a5cbd95e292a6116cc5c21b31c72cdf253ba27288667b3186c2b60532409c310e79cb47a8358e27bb
-
Filesize
232KB
MD5918029afa2b528e8dae80f9254a148ce
SHA151b4a69e1627d433c441f6616071d6ea84721bd7
SHA256fdfce71584bdaa6b6ddece13970373194175aeda6649d0b5d60df49786db9b7d
SHA5125bd74e22165009b6127e0e9c432b993e201dc0d635fc708a5cbd95e292a6116cc5c21b31c72cdf253ba27288667b3186c2b60532409c310e79cb47a8358e27bb
-
Filesize
232KB
MD5918029afa2b528e8dae80f9254a148ce
SHA151b4a69e1627d433c441f6616071d6ea84721bd7
SHA256fdfce71584bdaa6b6ddece13970373194175aeda6649d0b5d60df49786db9b7d
SHA5125bd74e22165009b6127e0e9c432b993e201dc0d635fc708a5cbd95e292a6116cc5c21b31c72cdf253ba27288667b3186c2b60532409c310e79cb47a8358e27bb
-
Filesize
232KB
MD5918029afa2b528e8dae80f9254a148ce
SHA151b4a69e1627d433c441f6616071d6ea84721bd7
SHA256fdfce71584bdaa6b6ddece13970373194175aeda6649d0b5d60df49786db9b7d
SHA5125bd74e22165009b6127e0e9c432b993e201dc0d635fc708a5cbd95e292a6116cc5c21b31c72cdf253ba27288667b3186c2b60532409c310e79cb47a8358e27bb
-
Filesize
597KB
MD5e6c3d863d6a9fb9e51280aadf8ec9e42
SHA1ec8290faa7e26405eaea43a9dc9ec116a396d177
SHA25679b327ad68eb99b76d244b1d3ae264e2ec3f26b1bee6c55edbbe2110ba5a6852
SHA512be5d124acb6e9fd6c3954b04ea84c3b67357eceeb49abfeb9e4c99d51aba5d92c481c3278e62ed80fe5d4fd8cb877fb5ce32960e86c094d33cd24a707f89eee7
-
Filesize
597KB
MD5e6c3d863d6a9fb9e51280aadf8ec9e42
SHA1ec8290faa7e26405eaea43a9dc9ec116a396d177
SHA25679b327ad68eb99b76d244b1d3ae264e2ec3f26b1bee6c55edbbe2110ba5a6852
SHA512be5d124acb6e9fd6c3954b04ea84c3b67357eceeb49abfeb9e4c99d51aba5d92c481c3278e62ed80fe5d4fd8cb877fb5ce32960e86c094d33cd24a707f89eee7
-
Filesize
286KB
MD5f44cbe20478245d86a4a9e23c14e89e5
SHA1c58837b039ce6701e21fa24cc19ded303fbbcd5f
SHA256390de8e58489858130953f052105a9656e250e594def4c32672fcf97ad91f520
SHA51206312de20e5ceaae6ce6be0c8c289fafcf97ffe30360c45329d1b050027ea5d891d3e4031d76addfc229f1115a6739a434d1326ccc506eb553638f04f8939e70
-
Filesize
286KB
MD5f44cbe20478245d86a4a9e23c14e89e5
SHA1c58837b039ce6701e21fa24cc19ded303fbbcd5f
SHA256390de8e58489858130953f052105a9656e250e594def4c32672fcf97ad91f520
SHA51206312de20e5ceaae6ce6be0c8c289fafcf97ffe30360c45329d1b050027ea5d891d3e4031d76addfc229f1115a6739a434d1326ccc506eb553638f04f8939e70
-
Filesize
316KB
MD5e5675210fb211a7c5a6e79d39674c831
SHA18c0815bc0b9833c0b6a6808cff6e2fde0ea1f16c
SHA256057f992b2a325f3add905ed2412d98645310235cdcdaac56584d50698a16d5d0
SHA512fa82ecfa505064267f233163c07db71723f84190194c9b2764d0894da72a75f455a64118cb5b4b59317f23318cc794ff932bb34ea9016e17a5cecb79c1c4238a
-
Filesize
316KB
MD5e5675210fb211a7c5a6e79d39674c831
SHA18c0815bc0b9833c0b6a6808cff6e2fde0ea1f16c
SHA256057f992b2a325f3add905ed2412d98645310235cdcdaac56584d50698a16d5d0
SHA512fa82ecfa505064267f233163c07db71723f84190194c9b2764d0894da72a75f455a64118cb5b4b59317f23318cc794ff932bb34ea9016e17a5cecb79c1c4238a
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
168KB
MD5e764698af44a1f870e9287bc2ccdd93d
SHA19e0c99c9b03c7213f8dffadad0700af2f5e12b6a
SHA2569f4841c5e83de87e45242c6a441921f32a946ab1a1f5f75340c8f9c9ac708a69
SHA512fff7d7e73e3c91ab6a6178ea67a8c8f7f3a2898f24db6618e44c2a6bbdc7c782ef8bf40b3c90006e4cfb35d0c180d8b50e521a9c23fd325631ee5cc29203bd28
-
Filesize
168KB
MD5e764698af44a1f870e9287bc2ccdd93d
SHA19e0c99c9b03c7213f8dffadad0700af2f5e12b6a
SHA2569f4841c5e83de87e45242c6a441921f32a946ab1a1f5f75340c8f9c9ac708a69
SHA512fff7d7e73e3c91ab6a6178ea67a8c8f7f3a2898f24db6618e44c2a6bbdc7c782ef8bf40b3c90006e4cfb35d0c180d8b50e521a9c23fd325631ee5cc29203bd28
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817